Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 06:10

General

  • Target

    98ad02e099afa787d4792e5aa9312c06.exe

  • Size

    255KB

  • MD5

    98ad02e099afa787d4792e5aa9312c06

  • SHA1

    1442f646f02b4319bcb6a0b86d6872f4785e8b0a

  • SHA256

    108413c924236f3b058e32f02b0129d58ec05e7af5ebdf5dc887d5dee0cbe53f

  • SHA512

    1533265a757126f3b68153ce9231d993aa83a90e77d29df3257fb9e85d03a02f45763a5591f2b9dce34d18fd6a9de94da677dc2c2f1a87e7d80307d73dafed68

  • SSDEEP

    6144:CheX7/jbFzc3WyF966fSdgewsVeMnnkZmWKMlu:NrrRUv9R6dgdOesnkZmWNlu

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98ad02e099afa787d4792e5aa9312c06.exe
    "C:\Users\Admin\AppData\Local\Temp\98ad02e099afa787d4792e5aa9312c06.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-0-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/4112-1-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/4112-2-0x00000000009D0000-0x00000000009D1000-memory.dmp

    Filesize

    4KB

  • memory/4112-3-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/4112-4-0x0000000000C00000-0x0000000000C29000-memory.dmp

    Filesize

    164KB

  • memory/4112-5-0x0000000002300000-0x000000000232F000-memory.dmp

    Filesize

    188KB

  • memory/4112-9-0x0000000000C00000-0x0000000000C29000-memory.dmp

    Filesize

    164KB

  • memory/4112-12-0x0000000002370000-0x0000000002397000-memory.dmp

    Filesize

    156KB

  • memory/4112-16-0x0000000000C00000-0x0000000000C29000-memory.dmp

    Filesize

    164KB

  • memory/4112-18-0x0000000000C00000-0x0000000000C29000-memory.dmp

    Filesize

    164KB